General
-
Target
fbcaa6e3ac52156f8e5e1f3f705c04de50154b2a9f07cef94a32725e1bb307ff
-
Size
352KB
-
Sample
221123-m4xnwsfg72
-
MD5
cbd17d27e82f5a6d605c54b0e09ae3a2
-
SHA1
0b9aaca97ef22b48f50af09415fd88b91e45dcc1
-
SHA256
fbcaa6e3ac52156f8e5e1f3f705c04de50154b2a9f07cef94a32725e1bb307ff
-
SHA512
2fc3803a8f8cec17c6bffb116e7afa13c33abdf455bf0d544de20515d03dd69d3f825604b6fac051ff1d7f279986dcf7ced33b7b5186481844799967766f8c73
-
SSDEEP
6144:oNvTOod870Aa5Xh289/xhYzVr6hTKNovhQphgdqnit2Mk9LUCXy7e+RF8ERf1VRP:mbuvaxhjIJ6h2Yhag0nisJUSm1VRP
Static task
static1
Behavioral task
behavioral1
Sample
fbcaa6e3ac52156f8e5e1f3f705c04de50154b2a9f07cef94a32725e1bb307ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbcaa6e3ac52156f8e5e1f3f705c04de50154b2a9f07cef94a32725e1bb307ff.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
fbcaa6e3ac52156f8e5e1f3f705c04de50154b2a9f07cef94a32725e1bb307ff
-
Size
352KB
-
MD5
cbd17d27e82f5a6d605c54b0e09ae3a2
-
SHA1
0b9aaca97ef22b48f50af09415fd88b91e45dcc1
-
SHA256
fbcaa6e3ac52156f8e5e1f3f705c04de50154b2a9f07cef94a32725e1bb307ff
-
SHA512
2fc3803a8f8cec17c6bffb116e7afa13c33abdf455bf0d544de20515d03dd69d3f825604b6fac051ff1d7f279986dcf7ced33b7b5186481844799967766f8c73
-
SSDEEP
6144:oNvTOod870Aa5Xh289/xhYzVr6hTKNovhQphgdqnit2Mk9LUCXy7e+RF8ERf1VRP:mbuvaxhjIJ6h2Yhag0nisJUSm1VRP
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-